GetUSB.info Logo

Swanky USB Lock Is Locked, Cocked and Ready to Rock

I’ve given tips on how to disable USB ports via security software or changing Windows USB register files, but the simplest way to secure a USB port is to block it. The folks at Earth-Trek developed a swanky USB lock which uses the UFD shaped key to also house the USB locks.
usb lock
As you can see in the picture, the key uses a mechanical lever type setup to insert the USB lock, then detach the key from the seated lock and the USB port is blocked. Judging by the picture it might not be hard to tear out the USB lock, but you’ll probably make enough noise in the attempt to draw attention.
usb lock
Continue Reading

Lexar JumpDrive Secure II is Loaded, or is it?

lexar jumpdrive secure iiWe’ve seen the capacity meter before from Lexar and they’ve now officially introduces the capacity meter technology to the Secure II USB flash drive line. The load meter doesn’t require connection to display the amount of storage left, it doesn’t require firmware and isn’t OS specific. It’s a standalone technology to communicate one simple thing and ultimately provides a little more flexibility and convenience for the user. The Lexar Secure II ships with 256-bit AES encryption technology which lets users protect data quickly and easily. Users can easily create multiple password-protected encrypted areas and simply drag files into the secure area for automatic encryption. Drag the files out again, and they are automatically decrypted. An excellent feature Lexar includes is their File Shredder utility that safely erases files and destroys the digital trail usually left behind with a simple file delete command. With the File Shredder whatever is deleted cannot be recovered or restored. The JumpDrive Secure II is available now in sizes between 512MB to 8GBs. Continue Reading

Beware of Freebie USB Sticks; Could Have Worms

I read an article today about the growing concern of worms embedded on USB flash drives. With the popularity of UFDs it’s important to protect yourself so that viruses, worms and identity theft don’t happen to you. This new type of worm is embedded on UFDs, than automatically runs when connected to an operating system.
Computer owners should tread very carefully when plugging an unknown device into their PC as it could have malicious code planted on it.
The best way to prevent a worm or virus from entering your system is disabling the autorun file on your Operating System before connecting the USB thumb drive. Since memory prices have dropped the USB stick is a hot item for tradeshows, give-aways and direct mailers. For this reason, it’s important to protect yourself from unwanted viruses. In addition, these flash drives could become a big threat to companies as the financial motivation to obtain secure information has big payoffs. Continue Reading

Linksys Wireless USB Network Adaptor, The WUSB200

Linksys, a division of Cisco, released their new Wireless G USB Network Adaptor aimed at small business. What Linksys did with this product is incorporate range booster technology to increase signal strength and improve data transfer speeds.
linksys wireless usb network adaptor
The RangeBooster technology makes the claim that range will increase by double and data transfer speed will increase by about 35%. And if you’re concerned about security, well then wireless products might be a little scary. Linksys covered their bases with a WPA2 256-bit encryption engine along with a Security Monitoring abilities to get the low-down when there’s a crack-down. No word on pricing or availability.
linksys wireless usb
Continue Reading

Free Open Source USB Encryption Software Utility: TrueCrypt

TrueCrypt has just what you are looking for, provided you are looking for free USB flash drive encryption software utilities.
usb encryption software
The best feature of TrueCrypt is the automatic, on-the-fly, real-time encryption process. So it’s completely transparent. The other great feature is the Plausible Deniability feature which provides two levels for you.
  • Level 1: Hidden volumes. This is where a volume is created within another volume by TrueCrypt. The upper level (the one seen by a person forcing you to get the content) is filled with random data, so you can show them “Look man, there’s nothing there!”
  • Level 2: A volume appears to consist of nothing more than random data, no signature or typology what-so-ever. Therefore, it is impossible to prove that a file, a partition or a device has been encrypted.
To round out the offerings of this free USB encryption software, TrueCrypt includes a key-log which records the time and date the last time modifications were made. Such as password changes, data access or more concerning information such as last time the device was mounted in an OS, or attempted to be mounted. The only down side, which I feel Continue Reading

Hacking Bluetooth With USB

I read an interesting report from Dark Reading today regarding hacking Bluetooth and how USB can play a roll. (Not that hacking for the dark force is anything cool) You don’t hear much about Bluetooth hacks because the tools needed (sniffers) start at about 10Grand.
bluetooth hack usb
A couple of security engineers where able to use a Cambridge Silicon Radio chip-based USB dongle, some flash memory and Bluetooth 2.x technology and some code hacked from a commercial Bluetooth sniffer to hack into a device’s communication via the Bluetooth signal. There was no specific USB hack How-To information but the point is that if a simple USB dongle can be construed to do Bluetooth hacking then security risks for not only communication but device control could become a huge big problem. Continue Reading

Tough Guy Industrial Grade UFD from STEC

So here we go again. Another industrial grade USB flash drive, this time from STEC. Yes it’s tough, yes the STEC will withstand shock, both physical and electric, and includes STEC proprietary flash memory controller. This built-I ECC engine can detect up to 5-byte errors and correct up to 4-byte errors and with advanced write algorithms to guarantee 2 million write/erase cycles. Not sure how they are doing that as I’ve reported before on the life cycle of a flash drive which is based more off the flash memory type not the algorithms used during the write process. None-the-less, we’ll drink their juice for now.
industrial grade usb flash drive
The STEC industrial grade UFD withstands the NEBS Level 3 compliance and passed ESD testing for 8kV and 15kV air. If you don’t know what all that means, well neither do I. With some quick Google searches we have:
NEBS Level 3 – Network Equipment Building System and level 3 means the product meets toughest requirements for fire, vibration and airflow. After reading the spec if you simply threw the UFD across the room onto your stove for 5 seconds and it survives, chances are you’ll pass the Level 3 NEBS test. Wiki NEBS
ESD 8kV & 15kV – Electrostatic Discharge of solid state electronics. A spark is triggered at 30KV so obviously the STEC wont withstand that, but surviving either 8kV or 15kV is above average. Wiki ESD
So it’s clear if you are in the need of an industrial grade UFD for specific applications the STEC key drives are worth a closer look. Continue Reading

USB Hack: Disable Writing to USB Drives

So here’s a poor mans USB hack to secure your network from unscrupulous characters downloading company secrets via USB. In Windows XP SP2 and Vista you can disable writing to USB devices altogether by implementing a simple registry hack.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\StorageDevicePolicies] “WriteProtect”=dword:00000001 **Note: I inserted a break after …Set\< br>Control… to fit into post page.
Once done, reboot and you’re set. Make sure others don’t have Administrative rights, otherwise they could easily set things back. Here is the Vista error message upon copy attempt:
usb hack disable usb devices
There is an auto executable download available to disable writing to USB drives without searching for the registry area yourself. If interested in this USB hack, then jump over to How-To-Geek and snag it. Continue Reading

ATP USB mini ToughDrive and CoSoSys Team Up

The CoSoSys Carry It Easy software we recently reported will now be found, pre-installed, on the ATP USB ToughDrive. The preloaded CoSoSys software will allow for quick and easy sync of email, contacts and personal bookmarks.
toughdrive
If not familiar with the ATP ToughDrive, it’s a ruggedized flash drive designed to withstand water, dust, static discharge and extreme temps. Include the Secure It Easy software from CoSoSys and now you’re not only portable but iron-clad secure too. Continue Reading

U3 Software: e-Capsule Zero Footprint Encrypted Web Browser

EISST or Enterprise Information Security Systems & Technologies introduced their 100 percent encrypted web browser, the e-Capsule, the first of it’s kind. We’ve seen countless warnings of Internet Explorer being hacked and e-Capsule could be your answer. E-Capsule is a zero footprint internet browser because the application launches from a U3 USB or UFD drive. The elegance of e-Capsule lies within the code as security and confidentiality of online sessions and transaction are embedded in the application design.
e-capsule
Here’s a great example of a normal browser: Continue Reading

First USB Firewall Secure It Easy by CoSoSys – Bring It On!

Hard to believe that nearly 70% of unauthorized access to sensitive data are from employees, not external hackers, viruses or worms. In many situations, IT managers are now understanding the ease in which company info can be stripped out via USB. To that end, CoSoSys introduces Secure It Easy, the first USB Firewall to ad IT managers in this battle against unauthorized theft.
usb firewall secure it easy
If you only protect your PC with a firewall and antivirus software you are only protecting if against threads posed from the outside (internet) and not protecting it against threats posed from the inside. Secure it Easy will help you to protect your PC from all threats posed by portable devices that are connected to your PC via the USB port. Secure it Easy gives you full control over your PCs endpoints.
With Secure It Easy managers have complete control over USB endpoints Continue Reading

Copyright

Copyright © 2006 +

USB Powered Gadgets and more...

All Rights Reserved

Advertise with us

GetUSB Advertising

This is a high value website providing great exposure to your product and brand. Visit our advertising page to learn specifics.

For more information
Visit our advertising page.

Nexcopy Ad

Nexcopy Provides

USB copy protection with digital rights management for data loaded on USB flash drives.

Contact us learn more

Resources and References Page

Resources and References Page